Patents by Inventor Michael T. Kalmbach

Michael T. Kalmbach has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20130198641
    Abstract: Once a computing device receives a request to display a webpage, the device may use criteria to determine the portion of the page that is likely to be the most relevant to the user. The computing device may then zoom in (i.e., adjust the relative size and position of the elements in the webpage) and pan or scroll through the webpage such that the most relevant portion is displayed. Additionally, the computing device may superimpose on the displayed portion of the webpage links that represent other portions of the webpage that are currently not displayed but are relevant to the currently displayed portion. Selecting a link causes the computing device to display the corresponding portion. Furthermore, as the user zooms out, the computing device may also highlight hotspots or points of interests for the new content that is being displayed.
    Type: Application
    Filed: January 30, 2012
    Publication date: August 1, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Sean T. Brownlow, Nathan G. Faiman, Michael T. Kalmbach, John E. Petri, Kevin Wendzel
  • Patent number: 8479271
    Abstract: Mobile network services are performed in a mobile data network in a way that is transparent to most of the existing equipment in the mobile data network. The mobile data network includes a radio access network and a core network. A breakout component in the radio access network breaks out data coming from a basestation, and hosts edge applications, including third party edge applications, that perform one or more mobile network services at the edge of the mobile data network based on the broken out data.
    Type: Grant
    Filed: December 20, 2011
    Date of Patent: July 2, 2013
    Assignee: International Business Machines Corporation
    Inventors: William F. Berg, Jeremiah D. Carlin, Michael T. Kalmbach, Mark D. Schroeder
  • Publication number: 20130165177
    Abstract: Mobile network services are performed in a mobile data network in a way that is transparent to most of the existing equipment in the mobile data network. The mobile data network includes a radio access network and a core network. A breakout component in the radio access network breaks out data coming from a basestation, and performs one or more mobile network services at the edge of the mobile data network based on the broken out data. The breakout component includes a service interface that performs primary control by one system, and backup control by a different system.
    Type: Application
    Filed: December 21, 2011
    Publication date: June 27, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: William F. Berg, Michael T. Kalmbach, Scott A. Liebl, Mark D. Schroeder
  • Publication number: 20130160085
    Abstract: Mobile network services are performed in a mobile data network in a way that is transparent to most of the existing equipment in the mobile data network. The mobile data network includes a radio access network and a core network. A breakout component in the radio access network breaks out data coming from a basestation, and hosts edge applications, including third party edge applications, that perform one or more mobile network services at the edge of the mobile data network based on the broken out data.
    Type: Application
    Filed: December 20, 2011
    Publication date: June 20, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: William F. Berg, Jeremiah D. Carlin, Michael T. Kalmbach, Mark D. Schroeder
  • Publication number: 20130155843
    Abstract: A mechanism provides autonomic recovery for a breakout appliance at the edge of a mobile data network from a variety of errors using a combination of hardware, software and network recovery actions. The recovery actions proceed upon a sliding scale depending on the severity of the problem to achieve the goals of minimizing disruption to traffic flowing through the NodeB while also maintaining an acceptable cost of ownership/maintenance of the system by automatically recovering from as many problems as possible. The error recovery functions within the breakout system hide the error recovery complexities from the management system upstream in the mobile data network. For critical, non-recoverable errors, the autonomic recovery mechanism works in conjunction with a fail-to-wire module to remove the breakout system in the event of a failure in such a way that the mobile data network functions as if the breakout system is no longer present.
    Type: Application
    Filed: December 19, 2011
    Publication date: June 20, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: William F. Berg, Michael T. Kalmbach, Mark D. Schroeder
  • Publication number: 20130157616
    Abstract: Mobile network services are performed in an appliance in a mobile data network in a way that is transparent to most of the existing equipment in the mobile data network. The mobile data network includes a radio access network and a core network. The appliance in the radio access network breaks out data coming from a basestation, and performs one or more mobile network services at the edge of the mobile data network based on the broken out data. The appliance has defined interfaces and defined commands on each interface that allow performing all needed functions on the appliance without revealing details regarding the hardware and software used to implement the appliance. This appliance architecture allows performing new mobile network services at the edge of a mobile data network within the infrastructure of an existing mobile data network.
    Type: Application
    Filed: December 19, 2011
    Publication date: June 20, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: William F. Berg, Michael T. Kalmbach, Mark D. Schroeder
  • Publication number: 20130121166
    Abstract: Mobile network services are performed in an appliance in a mobile data network in a way that is transparent to most of the existing equipment in the mobile data network. The mobile data network includes a radio access network and a core network. The appliance in the radio access network breaks out data coming from a basestation, and performs one or more mobile network services at the edge of the mobile data network based on the broken out data. The appliance has defined interfaces and defined commands on each interface that allow performing all needed functions on the appliance without revealing details regarding the hardware and software used to implement the appliance. This appliance architecture allows performing new mobile network services at the edge of a mobile data network within the infrastructure of an existing mobile data network.
    Type: Application
    Filed: November 16, 2011
    Publication date: May 16, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: William F. Berg, Jeremiah D. Carlin, Michael T. Kalmbach, Mark D. Schroeder
  • Publication number: 20130121175
    Abstract: Basestation equipment in a mobile data network is subject to harsh environmental conditions at many remote locations. International Business Machines Corporation (IBM) has introduced a Mobile Internet Optimization Platform (MIOP) appliance, referred herein as the MIOP@NodeB. This appliance is placed at the edge or basestation of a mobile data network to provide a platform for hosting applications and enhancing mobile network services. The introduction of an edge appliance provides a platform for additional reliability functions. A predictive failure mechanism in the basestation appliance mitigates the effects of predicted failures in a mobile network basestation due to weather conditions. The predictive failure mechanism considers historical data, ambient environmental conditions, weather alerts and weather forecasts to take pre-emptive action to avert partial or total failure of the basestation equipment.
    Type: Application
    Filed: November 16, 2011
    Publication date: May 16, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Jeremiah D. Carlin, Michael T. Kalmbach, Mark D. Schroeder
  • Publication number: 20130121324
    Abstract: Mobile network services are performed in a mobile data network in a way that is transparent to most of the existing equipment in the mobile data network. The mobile data network includes a radio access network and a core network. An edge caching mechanism is provided within a basestation to perform caching of data at the edge of the mobile data network. The edge caching mechanism analyzes historical usage data that indicates historical accesses to the basestation. Data patterns in the historical usage data may be used to define cache load criteria and to optionally define cache flush criteria. This architecture allows caching of data at the edge of a mobile data network within the infrastructure of an existing mobile data network.
    Type: Application
    Filed: November 16, 2011
    Publication date: May 16, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Michael T. Kalmbach, Mark D. Schroeder
  • Publication number: 20120330993
    Abstract: Techniques are described for allowing a first user to efficiently send contact information to a second user using a user communication of a messaging application such as email programs, instant messaging programs, social media websites, or chat rooms. The messaging application may maintain a name database that stores names that are relevant to a first user. When the first user then types or speaks a name into a user communication (e.g., an email, instant message, or voice message), the messaging application provides the first user with the names stored in the name database that match the name in the user communication. Additionally, the messaging application may use ranking data associated with each matched name to order the names according to relevance.
    Type: Application
    Filed: June 21, 2011
    Publication date: December 27, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Nathan G. Faiman, Michael T. Kalmbach, Brian R. Muras, Jared W. Patterson, Kevin Wendzel
  • Patent number: 8245086
    Abstract: Techniques are disclosed for conveying which hardware components of a logically partitioned computer system are assigned to a selected logical partition of the computer system. Partition information for the computer system is received. Further, a request is received from a user to view which hardware components of the computer system are assigned to a selected logical partition of the computer system. Based on the received partition information, one or more hardware components are determined that are assigned to the selected logical partition. Based on the determined hardware components, a virtual model of the computer system is generated that visually distinguishes hardware components assigned to the selected logical partition from hardware components not assigned to the selected logical partition. The virtual model is output responsive to the request.
    Type: Grant
    Filed: June 26, 2009
    Date of Patent: August 14, 2012
    Assignee: International Business Machines Corporation
    Inventors: Curtis S. Eide, Michael T. Kalmbach, Aditya Kumar, Timothy L. Thompson, Brent R. Tiefenthaler
  • Publication number: 20120192251
    Abstract: In an embodiment, a first device detects a first interaction between the first device and a second device. The first device assigns a first rating of the first interaction. The first device calculates an internal trust for the second device based on the first rating and a first time since the occurrence of the first interaction. The first device receives trust data from a third device. The first device calculates a community trust for the second device based on the trust data and an internal trust that the first device has for the third device. The first device calculates a total trust that the first device has for the second device based on the community trust and the internal trust that the first device has for the second device. If the total trust is less than a minimum threshold, the first device disallows a second interaction.
    Type: Application
    Filed: January 25, 2011
    Publication date: July 26, 2012
    Applicant: International Business Machines Corporation
    Inventors: Nathan G. Faiman, Michael T. Kalmbach, Jared W. Patterson, Kevin Wendzel
  • Publication number: 20120131480
    Abstract: A virtual machine snapshot mechanism takes snapshots of virtual machines on a computer system, generates relationships between a snapshot and resources on the computer system, and provides a graphical display of one or more snapshots that allow visually determining which snapshots include which resources. A user may search the snapshots based on user-specified criteria. If an exact match is not available, and closest match is identified in the graphical display.
    Type: Application
    Filed: November 24, 2010
    Publication date: May 24, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Michael T. Kalmbach, Dhaval K. Shah
  • Publication number: 20100332912
    Abstract: Systems, methods and articles of manufacture are disclosed for conveying which hardware components of a logically partitioned computer system are assigned to a selected logical partition of the computer system. Partition information for the computer system may be received. Further, a request may be received from a user to view which hardware components of the computer system are assigned to a selected logical partition of the computer system. Based on the received partition information, hardware components may be determined that are assigned to the selected logical partition. Based on the determined hardware components, a virtual model of the computer system may be generated that visually distinguishes hardware components assigned to the selected logical partition from hardware components not assigned to the selected logical partition. Responsive to the request, the virtual model may be output to a graphical display device.
    Type: Application
    Filed: June 26, 2009
    Publication date: December 30, 2010
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: CURTIS S. EIDE, MICHAEL T. KALMBACH, ADITYA KUMAR, TIMOTHY L. THOMPSON, BRENT R. TIEFENTHALER
  • Publication number: 20100228558
    Abstract: Techniques are disclosed selecting a targeted advertisement to present to an individual, based upon the product preference of others and the individual's relationships with others. By analyzing content such as images and text, an individual's interest in a product or an individual's relationship with another person may be determined. Generally, a profile may store the above information and a relational product grid may provide an organized description of the relationships and product interests. The salability of a given product to a particular individual may be determined by analyzing the relational product grid. Based upon the salability, advertisers may decide whether to advertise a product to an individual. Thus, by leveraging personal relationship data, advertisers may expand their targeted advertising campaigns.
    Type: Application
    Filed: March 3, 2009
    Publication date: September 9, 2010
    Applicant: International Business Machines Corporation
    Inventors: Sean D. Corcoran, Michael T. Kalmbach, Jared W. Patterson, Kevin Wendzel
  • Publication number: 20090328034
    Abstract: A method of establishing a bi-directional grid computing network includes submitting a processing job from a job requester to a central repository, querying nodes associated with the job requester to process the processing job, identifying suitable nodes associated with the job requester to process the processing job, transmitting the processing job from the job requester to at least one of the suitable nodes associated with the job requester, processing the processing job on the at least one suitable node associated with the job requester, and returning results from processing the processing job to the job requester.
    Type: Application
    Filed: June 25, 2008
    Publication date: December 31, 2009
    Applicant: International Business Machines Corporation
    Inventors: Sean D. Corcoran, Michael T. Kalmbach, Eric R. Larese, Jared W. Patterson, Kevin Wendzel
  • Publication number: 20090320134
    Abstract: A method, computer program product or computer system for scanning files in a computer system to detect additional infected files of a computer virus when a first infected file of the computer virus is identified, includes maintaining a friends tree for each file in the computer system, maintaining a search tree using the friends trees for scanning the files, searching the files listed in the search tree for the additional infected files, and quarantining the additional infected files detected in the searching.
    Type: Application
    Filed: June 24, 2008
    Publication date: December 24, 2009
    Inventors: Sean D. Corcoran, Michael T. Kalmbach, Jared W. Patterson, Kevin Wendzel
  • Publication number: 20090235191
    Abstract: Embodiments of the invention provide a method for distributing data from within a virtual world to multiple hosts. In one embodiment, primary areas within the virtual world may be hosted on servers controlled by the provider of the virtual world. At the same time, some areas within the virtual world may be controlled by a second party and hosted by a secondary server. In the virtual environment, an interface may be provided to access the area controlled by the second party.
    Type: Application
    Filed: March 11, 2008
    Publication date: September 17, 2009
    Inventors: Zachary A. Garbow, Michael T. Kalmbach, Bryan M. Logan
  • Publication number: 20090234948
    Abstract: Embodiments of the invention provide a method for distributing data from within a virtual world to multiple hosts. In one embodiment, primary areas within the virtual world may be hosted on servers controlled by the provider of the virtual world. At the same time, some areas within the virtual world may be controlled by a second party and hosted by a secondary server. In the virtual environment, an interface may be provided to access the area controlled by the second party.
    Type: Application
    Filed: March 11, 2008
    Publication date: September 17, 2009
    Inventors: Zachary A. Garbow, Michael T. Kalmbach, Bryan M. Logan